hola, the passwords within database are encrypted with MD5 algo by default - since its an openSource project the encryption algo can be exchanged ;-)
-> the fact, that one can read the MD5 hash from database, is caused by the security settings of the database itself (-> you can minimize that risk by restricting access to your database from IP Ranges, for example) -> i think, there is a higher risk getting "hacked" by networksniffing (trying to get user account data via Wireshark , etc...) Principally there are methods to decrypt a MD5 Hash (by bruteforcing, e.g.), but if someone has access to the encrypted password, something else has gone wrong already, i think... see ya Smoeker On 25 Jan., 08:41, The Anh <anh...@gmail.com> wrote: > Hi there, > As you know, the database of OM (including user data, conference > data ...) can be seen by surfing the address:http://localhost/phpmyadmin. > In this page, I can see the passwords of the users (they were > encrypted) but I wonder that with this code (encrypted password) if > someone can find out the real password or uses them to log in OM with > the user account? > Could anyone explain for me about this? > Thanks alot, > Best Regards, -- You received this message because you are subscribed to the Google Groups "OpenMeetings User" group. To post to this group, send email to openmeetings-u...@googlegroups.com. To unsubscribe from this group, send email to openmeetings-user+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/openmeetings-user?hl=en.